必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): United States of America (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 138.16.220.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25419
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;138.16.220.244.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 01:06:48 CST 2025
;; MSG SIZE  rcvd: 107
HOST信息:
Host 244.220.16.138.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 244.220.16.138.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
192.241.234.234 attackbotsspam
none
2020-09-05 09:00:24
191.31.91.156 attackspambots
Automatic report - Port Scan Attack
2020-09-05 12:27:59
106.12.105.130 attackspam
Automatic report BANNED IP
2020-09-05 08:59:08
93.136.0.140 attackspambots
Honeypot attack, port: 445, PTR: 93-136-0-140.adsl.net.t-com.hr.
2020-09-05 12:30:31
200.146.246.196 attackspambots
1599238433 - 09/04/2020 18:53:53 Host: 200.146.246.196/200.146.246.196 Port: 445 TCP Blocked
2020-09-05 12:02:52
85.227.172.180 attackbotsspam
Honeypot attack, port: 5555, PTR: ua-85-227-172-180.bbcust.telenor.se.
2020-09-05 09:02:50
82.166.85.112 attackspambots
Automatic report - Banned IP Access
2020-09-05 12:00:12
103.92.24.240 attack
Sep  5 02:50:09 electroncash sshd[21564]: Failed password for invalid user kevin from 103.92.24.240 port 44544 ssh2
Sep  5 02:54:15 electroncash sshd[22594]: Invalid user julio from 103.92.24.240 port 49240
Sep  5 02:54:15 electroncash sshd[22594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.92.24.240 
Sep  5 02:54:15 electroncash sshd[22594]: Invalid user julio from 103.92.24.240 port 49240
Sep  5 02:54:16 electroncash sshd[22594]: Failed password for invalid user julio from 103.92.24.240 port 49240 ssh2
...
2020-09-05 08:54:54
113.53.41.55 attackspam
Sep  4 18:52:29 rotator sshd\[7172\]: Invalid user admin from 113.53.41.55Sep  4 18:52:32 rotator sshd\[7172\]: Failed password for invalid user admin from 113.53.41.55 port 44707 ssh2Sep  4 18:52:35 rotator sshd\[7174\]: Invalid user admin from 113.53.41.55Sep  4 18:52:37 rotator sshd\[7174\]: Failed password for invalid user admin from 113.53.41.55 port 44845 ssh2Sep  4 18:52:40 rotator sshd\[7176\]: Invalid user admin from 113.53.41.55Sep  4 18:52:42 rotator sshd\[7176\]: Failed password for invalid user admin from 113.53.41.55 port 44964 ssh2
...
2020-09-05 12:50:57
51.75.195.80 attack
51.75.195.80 - - [04/Sep/2020:18:48:48 +0200] "POST /wp-login.php HTTP/1.0" 200 4792 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-05 08:49:25
1.180.230.98 attackbots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-09-05 09:00:10
94.55.170.228 attackspambots
Icarus honeypot on github
2020-09-05 08:50:21
51.38.48.127 attackspam
Sep  5 06:22:40 vps sshd[10907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.48.127 
Sep  5 06:22:42 vps sshd[10907]: Failed password for invalid user lionel from 51.38.48.127 port 32836 ssh2
Sep  5 06:29:00 vps sshd[11352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.48.127 
...
2020-09-05 12:30:57
138.197.189.136 attackbotsspam
Sep  5 06:21:39 rotator sshd\[17854\]: Invalid user administrador from 138.197.189.136Sep  5 06:21:40 rotator sshd\[17854\]: Failed password for invalid user administrador from 138.197.189.136 port 58512 ssh2Sep  5 06:25:18 rotator sshd\[18687\]: Invalid user bsnl from 138.197.189.136Sep  5 06:25:20 rotator sshd\[18687\]: Failed password for invalid user bsnl from 138.197.189.136 port 37018 ssh2Sep  5 06:28:48 rotator sshd\[18797\]: Invalid user werner from 138.197.189.136Sep  5 06:28:50 rotator sshd\[18797\]: Failed password for invalid user werner from 138.197.189.136 port 43756 ssh2
...
2020-09-05 12:48:11
64.225.47.162 attack
Fail2Ban Ban Triggered
2020-09-05 12:26:56

最近上报的IP列表

54.143.235.149 63.220.164.172 62.146.220.18 17.250.46.211
92.97.131.35 70.137.39.24 84.28.54.218 161.164.109.66
7.10.185.86 131.16.224.95 85.123.224.161 170.80.71.110
210.236.165.215 43.87.91.145 189.13.4.17 114.5.109.77
230.13.205.100 180.209.183.131 141.139.58.50 18.56.70.163